Apply for the job
Niche Recruiting

It Support Engineer

Johannesburg, Gauteng, ZA

Company: Niche Recruiting

Category: Computer and Mathematical Occupations

Published on 2022-05-09 06:39

12 month contract role with the possibility of going permanent.Information SecurityImplementing security controls, risk assessment frameworks, and programs which align to regulatory requirements, ensuring documented and sustainable compliance that aligns and advances the organisations cloud security.Performing and investigating internal and external information security risk and exceptions assessments. Assess incidents, vulnerability management, scans, patching status, secure baselines, penetration test result, phishing, and social engineering tests and attacks.Documenting and reporting control failures and gaps to stakeholders.Providing remediation guidance and preparing management reports to track remediation activities.Assisting clients and other staff in the management and oversight of security program functions.Remaining current on best practices and technological advancements and acting as the organisations technical resource for security assessment and regulatory compliance.Reviewing SOX controlsISO ConsultingIllustrate the concepts concerning management systems paying special attention to the understanding and adoption of management systems principles, ensuring that the design and implementation of the management systems is suited to the clients culture and specific business environment.Identifying the appropriate processes needed for its management systems, define the relative importance and interaction of those processes and assist the client/ organization in identifying documentation essential to ensure the effective planning, operation and control of its processes.Evaluate the effectiveness and efficiency of processes to stimulate the organization to look for opportunities for improvement and assist in promoting a process approach and continual improvement of the management systems within the organization.Identifying the training needs to enable the organization to maintain the management systems.Developing Policies, Procedures, Sequence & Interactions, Mandatory Procedures and Forms & Templates, organizational structures, etc.Provide technical advice and guidance to organizations on how to handle problems relating to the management system.Recommend processes and procedural improvements.Conduct risk assessments based on client requirementsConduct Internal Audits and Gap Analysis Audits (Audit Reports, Meeting of Minutes, Non-Conformance Reports, Corrective Actions Reports)Implementation of Systems (on-the-job training and assessments)Follow-up with clients via phone and emailEngage with the client based on their requirements and the Scope of workReport on all client complaints and satisfactionPerform Problem solving techniquesQuality Assurance (vetting all processes before submission, spelling and grammar)Attend Meetings (internally and externally).Maintain a current and accurate filling system (server and projects filing)Report to Senior Project Manager on status and progress of Systems. (Report, E-mail, or verbally)Using a Variety of Software Packages, Such as Microsoft Word, Outlook, PowerPoint, Excel, Access, Visio, Etc.Key knowledge areas:Cloud infrastructure, security architecture and standards;Applicable information security management, governance, and compliance principles, practices, laws, rules and regulations;Information technology systems and processes, network infrastructure, data architecture, data processes, and protocols;Cyber and cloud security standard frameworks, architecture, design, operations, controls, technology, solutions, and service orchestration;Information systems auditing, monitoring, controlling, and assessment process;Incident response management;Risk assessment and management methodology.Key skills requirements:Maintaining cloud infrastructure;Researching and locating vulnerabilities to the systems security;Maintaining confidentiality;Troubleshooting and operating a computer and various software packages;Defining problems, collecting and analysing data, establishing facts and drawing valid conclusions;Using judgement and ingenuity in maintaining objectives and technical standardsThe ideal candidate should have the ability to:Effectively communicate technical issues to diverse audiences, both in writing and verballyApply a risk-based approach to planning, executing, and reporting on audit engagements and auditing processes;Evaluate and update and/or revise program materials;Learn quickly and apply knowledge to new situations;Handle sensitive and confidential matters, situations, and data;Understand and follow broad and complex instructions;Interact positively with all relevant parties in order to enhance effectiveness and to promote quality service;Comprehend technical language and to confer, analyse and write in an objective, clear manner;Work independently and prioritise multiple tasks and adapt to needed changes;Remain calm under pressure.Minimum Experience and Qualifications Required:Bachelors degree in related business or technical areas, or an equivalency of education and work experience.Certificates in cyber security, governance or any other related fields.Minimum 3 (three) years proven work experience in a similar role.ISACA Certification (CISA/ CRISC/ CISM/ CGEIT/ CSX-P/ CDPSE) will be an added advantage.Valid drivers licence.NB to be based off site at a clients premises. (Randfortein)

© 2022 JobSearchine South Africa